Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Classification of traffic using NTP fails

Hi folks,

I have tried various settings in the firewall rules that use the hairpin NAT to provide local NTP services. The daily reports show a high count of hits on UDP 123. Occasionally the report shows a low count hit on NTP, which I suspect is from the internal NTP server checking time.

The issue is not new and has been seen in a number of previous versions of XG firmware.

So, what needs to be changed in my rules to allow correct classification of NTP or is there a fix required to XG firmware?

The current hairpin rules are using DPI, I have tried using web proxy.

Ian



This thread was automatically locked due to age.
Parents Reply
  • You could do the following: 

    tcpdump -ni any port 123 -b -w /tmp/ntp.pcap & 

    conntrack -E | grep 123 > /tmp/conntrack.log & 

    Those commands will run until you reboot the appliance or stop them by doing a kill command: 

    Use: ps | grep tcpdump    //      ps | grep conntrack

    SFV6C8_AZ01_SFOS 19.0.0 GA-Build317# ps | grep tcpdump
    tcpdump 6605 6394 root 11176 392 S tcpdump -ni any port 123 -b -w /tmp/test.pcap
    grep 6724 6394 root 22928 2788 S grep tcpdump

    Use the first number (6605) and kill it with: kill -9 6605 

    Let both commands run for some time and then check again. 

Children